Network Intrusion Detection System in a Light Bulb

Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann | Published: 2022-10-06

Federated Boosted Decision Trees with Differential Privacy

Authors: Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha | Published: 2022-10-06

Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06

DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing

Authors: Jiawei Shao, Yuchang Sun, Songze Li, Jun Zhang | Published: 2022-10-06

A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning

Authors: Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu | Published: 2022-10-05 | Updated: 2024-04-19

Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models

Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05

Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase

Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04